Sebanyak 559 item atau buku ditemukan

Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage. The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed. Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.

The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed.

Linux Security Cookbook

Looks at security issues for Linux users, covering such topics as controlling access to systems, protecting network connections, encrypting files, and detecting intrusions.

Looks at security issues for Linux users, covering such topics as controlling access to systems, protecting network connections, encrypting files, and detecting intrusions.

Linux Kernel Development

The authoritative guide to the latest Linux kernel: fully updated, with an all-new chapter on kernel data structures. * *Authored by a well-known member of the Linux kernel development team with a reputation for clarity, readability, and insight. *Covers all major subsystems and features of the latest version of the Linux 2.6.xx kernel. *Provides examples based on real kernel code: samples that developers can use to modify and improve the Linux kernel on their own. Linux Kernel Development, 3/e, is a start-to-finish guide to the design and implementation of the latest Linux 2.6.xx kernel, written specifically for programmers who want to understand the existing kernel, write new kernel code, and write software that relies on the kernel's behavior. Author Robert Love is respected worldwide for his contributions to the Linux kernel: contributions that have improved everything from Linux preemption and process scheduling to virtual memory. In this book, he illuminates every major subsystem and feature of the current Linux kernel: their purpose, goals, design, implementation, and programming interfaces. He covers the kernel both from a theoretical and applied standpoint, helping programmers gain deep insights into operating system design as they master the skills of writing Linux kernel code.Love covers all important algorithms, relevant subsystems, process management, scheduling, time management and timers, system call interface, memory addressing, memory management, paging strategies, caching layers, VFS, kernel synchronization, signals, and more. This edition has been updated throughout to reflect changes since the original Linux kernel 2.6 was released. It also contains an entirely new chapter on kernel data structures.

In this book, he illuminates every major subsystem and feature of the current Linux kernel: their purpose, goals, design, implementation, and programming interfaces.

The Prentice Hall Anthology of Science Fiction and Fantasy

This one volume anthology explores the last two hundred years of Science Fiction and Fantasy—featuring women and men authors of various ethnic backgrounds, and a range of both traditional canonical literature and popular culture. Designed to heighten interest in a fun and exciting topic, this book will lead readers to meaningful intellectual, social, and historic investigations. Contributing authors include Mary W. Shelly, Edgar Allen Poe, Nathaniel Hawthorne, Charles Dickens, Louisa May Alcott, Harriet Beecher Stowe, Bram Stoker, Stephen King, J.R.R. Tolkien, Jules Verne, Jack London, Ray Bradbury, and Kurt Vonnegut. For fans of science fiction, fantasy, and the stories presented here, who appreciate that they represent the best of humanity, and include potential warnings for where humanity is headed.

This one volume anthology explores the last two hundred years of Science Fiction and Fantasy—featuring women and men authors of various ethnic backgrounds, and a range of both traditional canonical literature and popular culture.

The Prentice-Hall encyclopedia of information technology

Functioning as both a dictionary and an encyclopedia, this multi-purpose, one-volume reference will serve as a valuable source for information on all aspects of information technology, including the many different types of hardware, systems, applications, and languages in use today.

Functioning as both a dictionary and an encyclopedia, this multi-purpose, one-volume reference will serve as a valuable source for information on all aspects of information technology, including the many different types of hardware, systems ...

The Prentice-Hall standard glossary of computer terminology

Covers Hardware, Programming, Essential Jargon & Other Terms & How They Are Used

Covers Hardware, Programming, Essential Jargon & Other Terms & How They Are Used